-
401
Asynchronous Robust Aggregation Method with Privacy Protection for IoV Federated Learning
Published 2024-01-01“…Then, we design a communication-efficient and security enhanced aggregation protocol based on homomorphic encryption, to achieve asynchronous group robust aggregation while protecting data privacy and reducing communication overhead. …”
Get full text
Article -
402
Original : high speed data compression techniques for large scale storage system change to a partially homomorphic database encryption
Published 2014“…Current design of HELib is implemented using the Brakerski-Gentry-Vaiguntanathan (BGV) homomorphic encryption schema, thus data is guaranteed to be more secure at the server end. …”
Get full text
Final Year Project (FYP) -
403
Towards enhancement of privacy-preserving data mining model for predicting students learning outcomes performance
Published 2021“…This PPDM combines two privacy preserving approaches which are k-anonymization and homomorphic encryption. On the other hand, for the data mining, classification algorithms such as Random Forest, Support Vector Machine, and Naïve Bayes are compared to find the best accuracy. …”
Conference or Workshop Item -
404
The Study of Monotonic Core Functions and Their Use to Build RNS Number Comparators
Published 2021-04-01“…The potential applications of the new comparator include some recently developed homomorphic encryption algorithms implemented using RNS.…”
Get full text
Article -
405
Multidimensional Epidemiological Survey Data Aggregation Scheme Based on Personalized Local Differential Privacy
Published 2024-03-01“…By using Paillier homomorphic encryption and an identity-based signature scheme to further prevent differential attacks and achieve multidimensional data aggregation, the safe, efficient, and accurate aggregation processing of ESD is executed. …”
Get full text
Article -
406
Hadoop-based secure storage solution for big data in cloud computing environment
Published 2024-02-01“…Then, we improve the ECC encryption algorithm for the encryption of ordinary data, and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated. …”
Get full text
Article -
407
Bit Incorporated Codon Positional Encoder (BICPE) Algorithm for Privacy Preservation in Vertically Partitioned Data in Cloud
Published 2022-09-01“…The performance of the proposed technique is compared with the traditional Homomorphic Encryption (HE) in terms of support threshold values (Ts) for different items in a transaction. …”
Get full text
Article -
408
Review of Privacy-Preserving Research in Recommendation Systems
Published 2023-08-01“…This paper firstly summarizes the privacy-preserving technology, including differential privacy technology, homomorphic encryption technology, federated learning and secure multi-party computing technology, and compares these commonly used privacy-preserving tech-nologies. …”
Get full text
Article -
409
Full Data-Processing Power Load Forecasting Based on Vertical Federated Learning
Published 2023-01-01“…Furthermore, we further use RSA encryption in the private set intersection and Paillier homomorphic encryption in the training and inference phases. …”
Get full text
Article -
410
LPCP: An efficient Privacy-Preserving Protocol for Polynomial Calculation Based on CRT
Published 2022-03-01“…Our protocol utilizes CRT-based encryption and re-encryption techniques to realize additional and multiplicative homomorphic encryption, which can be transformed into a two-party secure computation scheme. …”
Get full text
Article -
411
A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit
Published 2023-01-01“…First, we provide privacy preserving of transaction contents based on homomorphic encryption. It is flexible, as we decouple user identity and transaction contents. …”
Get full text
Article -
412
Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning
Published 2024-02-01“…Furthermore, it obtains a timing performance that does not significantly affect the total training time, unlike protocols that use Homomorphic Encryption.…”
Get full text
Article -
413
TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server
Published 2022-01-01“…Secure computation can be divided into those using homomorphic encryption and secret sharing. The advantage of the former method is that the computation can be performed on a single computing server and the computation process can be made public if the encryption key used is securely managed. …”
Get full text
Article -
414
Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving Techniques
Published 2023-12-01“…Additionally, we suggest the integration of privacy-enhancing technologies such as secure multi-party computation, homomorphic encryption, and differential privacy with blockchain to accomplish both security and privacy, aligning with the data sharing practices outlined in the General Data Protection Regulation (GDPR) in Europe.…”
Get full text
Article -
415
Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment
Published 2023-09-01“…This study further designs and evaluates a TEE-based federated learning model, comparing its resource overhead with other secure aggregation frameworks, like homomorphic encryption (HE) and differential privacy (DP). …”
Get full text
Article -
416
Privacy‐preserving gradient boosting tree: Vertical federated learning for collaborative bearing fault diagnosis
Published 2022-09-01“…Only the model information will be shared under the homomorphic encryption protocol, safeguarding data privacy while retaining high accuracy. …”
Get full text
Article -
417
BURLAP: Bits of Useful Randomness enable Learning with Adjustable Privacy
Published 2023“…While cryptography-based approaches such as Fully Homomorphic Encryption (FHE) can be used to provide privacy guarantees that have been rigorously characterized and proven, their adoption comes with two main practical hurdles. …”
Get full text
Thesis -
418
Lattice-based FHE as secure as PKE
Published 2014“…We show that (leveled) fully homomorphic encryption (FHE) can be based on the hardness of O(n[superscript 1.5+ε])-approximation for lattice problems (such as GapSVP) under quantum reductions for any ε 〉 0 (or O(n[superscript 2+ε])-approximation under classical reductions). …”
Get full text
Get full text
Article -
419
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
Published 2021-01-01“…The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. …”
Get full text
Article -
420
Advancements and Challenges in Energy-efficient 6G Mobile Communication Network
Published 2023-01-01“…Cutting-edge security methods such as homomorphic encryption and blockchain technology may be essential in this regard. …”
Get full text
Article